Cyber Security Is The Practice of Defending Computers
Cyber Security Is The Practice of Defending Computers
electronic systems, networks, and data from malicious attacks. It's also known as
information technology security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can be divided into a few
common categories.
Medical services, retailers and public entities experienced the most breaches, with
malicious criminals responsible for most incidents. Some of these sectors are more
appealing to cybercriminals because they collect financial and medical data, but all
businesses that use networks can be targeted for customer data, corporate espionage,
or customer attacks.
With the scale of the cyber threat set to continue to rise, the International Data
Corporation predicts that worldwide spending on cyber-security solutions will reach a
massive $133.7 billion by 2022. Governments across the globe have responded to the
rising cyber threat with guidance to help organizations implement effective cyber-
security practices.
In the U.S., the National Institute of Standards and Technology (NIST) has created
a cyber-security framework. To combat the proliferation of malicious code and aid in
early detection, the framework recommends continuous, real-time monitoring of all
electronic resources.
The importance of system monitoring is echoed in the “10 steps to cyber security”,
guidance provided by the U.K. government’s National Cyber Security Centre. In Australia,
The Australian Cyber Security Centre (ACSC) regularly publishes guidance on how organizations
can counter the latest cyber-security threats.
Types of cyber threats
The threats countered by cyber-security are three-fold:
So, how do malicious actors gain control of computer systems? Here are some common
methods used to threaten cyber-security:
Malware
Malware means malicious software. One of the most common cyber threats, malware is
software that a cybercriminal or hacker has created to disrupt or damage a legitimate
user’s computer. Often spread via an unsolicited email attachment or legitimate-looking
download, malware may be used by cybercriminals to make money or in politically
motivated cyber-attacks.
· Virus: A self-replicating program that attaches itself to clean file and spreads
throughout a computer system, infecting files with malicious code.
· Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick
users into uploading Trojans onto their computer where they cause damage or collect
data.
· Spyware: A program that secretly records what a user does, so that cybercriminals can
make use of this information. For example, spyware could capture credit card details.
· Ransomware: Malware which locks down a user’s files and data, with the threat of
erasing it unless a ransom is paid.
· Adware: Advertising software which can be used to spread malware.
· Botnets: Networks of malware infected computers which cybercriminals use to perform
tasks online without the user’s permission.
SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take
control of and steal data from a database. Cybercriminals exploit vulnerabilities in data-
driven applications to insert malicious code into a databased via a malicious SQL
statement. This gives them access to the sensitive information contained in the
database.
Phishing
Phishing is when cybercriminals target victims with emails that appear to be from a
legitimate company asking for sensitive information. Phishing attacks are often used to
dupe people into handing over credit card data and other personal information.
Man-in-the-middle attack
A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts
communication between two individuals in order to steal data. For example, on an
unsecure WiFi network, an attacker could intercept data being passed from the victim’s
device and the network.
Denial-of-service attack
A denial-of-service attack is where cybercriminals prevent a computer system from
fulfilling legitimate requests by overwhelming the networks and servers with traffic. This
renders the system unusable, preventing an organization from carrying out vital
functions.
Dridex malware
In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an
organized cyber-criminal group for their part in a global Dridex malware attack. This
malicious campaign affected the public, government, infrastructure and business
worldwide.
Dridex is a financial trojan with a range of capabilities. Affecting victims since 2014, it
infects computers though phishing emails or existing malware. Capable of stealing
passwords, banking details and personal data which can be used in fraudulent
transactions, it has caused massive financial losses amounting to hundreds of millions.
In response to the Dridex attacks, the U.K.’s National Cyber Security Centre advises the
public to “ensure devices are patched, anti-virus is turned on and up to date and files
are backed up”.
Romance scams
In February 2020, the FBI warned U.S. citizens to be aware of confidence fraud that
cybercriminals commit using dating sites, chat rooms and apps. Perpetrators take
advantage of people seeking new partners, duping victims into giving away personal
data.
The FBI reports that romance cyber threats affected 114 victims in New Mexico in 2019,
with financial losses amounting to $1.6 million.
Emotet malware
In late 2019, The Australian Cyber Security Centre warned national organizations about
a widespread global cyber threat from Emotet malware.
Emotet is a sophisticated trojan that can steal data and also load other malware. Emotet
thrives on unsophisticated password: a reminder of the importance of creating a secure
password to guard against cyber threats.
End-user protection
End-user protection or endpoint security is a crucial aspect of cyber security. After all, it
is often an individual (the end-user) who accidentally uploads malware or another form
of cyber threat to their desktop, laptop or mobile device.
So, how do cyber-security measures protect end users and systems? First, cyber-
security relies on cryptographic protocols to encrypt emails, files, and other critical data.
This not only protects information in transit, but also guards against loss or theft.
In addition, end-user security software scans computers for pieces of malicious code,
quarantines this code, and then removes it from the machine. Security programs can
even detect and remove malicious code hidden in primary boot record and are designed
to encrypt or wipe data from computer’s hard drive.
Electronic security protocols also focus on real-time malware detection. Many use
heuristic and behavioral analysis to monitor the behavior of a program and its code to
defend against viruses or Trojans that change their shape with each execution
(polymorphic and metamorphic malware). Security programs can confine potentially
malicious programs to a virtual bubble separate from a user's network to analyze their
behavior and learn how to better detect new infections.
1. Update your software and operating system: This means you benefit from the latest
security patches.
2. Use anti-virus software: Security solutions like Kaspersky Total Security will detect
and removes threats. Keep your software updated for the best level of protection.
3. Use strong passwords: Ensure your passwords are not easily guessable.
4. Do not open email attachments from unknown senders: These could be infected
with malware.
5. Do not click on links in emails from unknown senders or unfamiliar websites:This
is a common way that malware is spread.
6. Avoid using unsecure WiFi networks in public places: Unsecure networks leave
you vulnerable to man-in-the-middle attacks.
Data Privacy
Data Privacy Definition
Data Privacy describes the practices which ensure that the data shared by customers is
only used for its intended purpose. In a world with ever-growing mountains of big data,
privacy is an increasing topic of scrutiny.
Information privacy is the right of individuals to have control over how their personal
information is collected and used. Many consider data privacy to be the most significant
consumer protection issue today. One factor which contributes to this is growing
technological sophistication, and the resulting types of data collected.
Data privacy laws such as the United States’ Health Insurance Portability and
Accountability Act (HIPAA) govern specific types of data. Other examples like the
Electronic Communications Privacy Act (ECPA) extend government restrictions on
wiretaps to include transmissions of electronic data. The Children’s Online Privacy
Protection Act (COPPA) gives parents control over what information websites can
collect from their kids. While the EU’s General Data Protection Regulation (GDPR)
gives citizens new control over their data and their interactions with companies.
Compliance officers within an organization are responsible for designing a data privacy
policy so understanding data privacy regulations like these is a key element of the role.
US data privacy laws are regulated at the federal level. There are a growing number of
data privacy laws by state. One example is the California Consumer Privacy Act
(CCPA). A data privacy officer or compliance officer within each organization will ensure
the practices and programs that comply with these laws. Compliance requirements for
data privacy are getting more complex as different jurisdictions enact their data
protection laws.
First, the fines and penalties written into data privacy regulations can be quite steep. For
example, under the EU’s General Data Protection Regulation (GDPR), organizations
can be fined 4% of annual global revenue or 20 million euros. Beyond the potential
punitive costs, cost-savings are possible benefits of a program that addresses key data
privacy issues. Data protection regulations like GDPR require not only safeguarding
user data, but also responding and sharing data upon request. Clean, efficient
processes for the organization to meet these data governance obligations can reap
substantial cost-savings.
In January 2019, Cisco reported that two-thirds of companies say they are seeing sales
delays due to data privacy questions from their customers. Violations of data privacy
erode consumer, investor, and stakeholder trust in the organization. When a
stakeholder has doubts about the organization’s ability to prevent identity theft, they
may be unwilling to conduct business with that organization. Conversely, this
awareness makes people more likely to do business with organizations that understand
their obligations under consumer data privacy laws. An organization that demonstrates
a solid understanding of data privacy principles is often seen as a leader in their
category. Healthy data privacy programs are only possible with investment and support
from the leadership team. Smart corporate board directors will grasp the value of this
approach.
Organizations that implement a healthy data privacy program reduce the number of
security incidents that result in privacy breaches. Fewer breaches mean the business
does not lose trust. Guarding against this erosion of trust is important to prevent losing
customers or other types of business. It also saves the business from fines, multi-year
penalties, or civil suits which often follow on significant breaches.
Besides an impact on the business, consider that data privacy issues can hurt the
individuals affected. Loss of personally identifiable information can negatively impact
individual users, customers or citizens. Cases have been reported of data subjects
dealing with breach and privacy problems for decades after data loss. Beyond the
punitive impacts enshrined in data protection regulations, an organization may be held
liable by the individual for these issues.
Forbes reported in 2014 that 46% of organizations suffered damage to their reputation
and brand value as a result of a privacy breach. The benefits of complying with data
privacy laws grow in clarity every day in a world where new jurisdictions are passing
their own data protection regulations.
You can store and access your EEG data from anywhere with peace of mind knowing
that it’s fully protected and private. All EMOTIV employees are trained in secure and
respectful handling of personal data, as per GDPR and California Consumer Privacy Act
(CCPA) requirements.